• Title/Summary/Keyword: node state

Search Result 509, Processing Time 0.027 seconds

Time Switching for Wireless Communications with Full-Duplex Relaying in Imperfect CSI Condition

  • Nguyen, Tan N.;Do, Dinh-Thuan;Tran, Phuong T.;Voznak, Miroslav
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4223-4239
    • /
    • 2016
  • In this paper, we consider an amplify-and-forward (AF) full-duplex relay network (FDRN) using simultaneous wireless information and power transfer, where a battery-free relay node harvests energy from the received radio frequency (RF) signals from a source node and uses the harvested energy to forward the source information to destination node. The time-switching relaying (TSR) protocol is studied, with the assumption that the channel state information (CSI) at the relay node is imperfect. We deliver a rigorous analysis of the outage probability of the proposed system. Based on the outage probability expressions, the optimal time switching factor are obtained via the numerical search method. The simulation and numerical results provide practical insights into the effect of various system parameters, such as the time switching factor, the noise power, the energy harvesting efficiency, and the channel estimation error on the performance of this network. It is also observed that for the imperfect CSI case, the proposed scheme still can provide acceptable outage performance given that the channel estimation error is bounded in a permissible interval.

A Design of Security Protocol for Active Warehouse Condition Management System based on Ubiquitous Environment (유비쿼터스 환경에능동형 창고 상태관리를 위한 보안 프로토콜 설계)

  • John, Young-Jun;Choi, Yong-Sik;Shin, Seung-Ho;Park, Sang-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.6
    • /
    • pp.91-108
    • /
    • 2006
  • RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.

Analysis of Energy Consumption and Sleeping Protocols in PHY-MAC for UWB Networks

  • Khan, M.A.;Parvez, A.Al;Hoque, M.E.;An, Xizhi;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1028-1036
    • /
    • 2006
  • Energy conservation is an important issue in wireless networks, especially for self-organized, low power, low data-rate impulse-radio ultra-wideband (IR-UWB) networks, where every node is a battery-driven device. To conserve energy, it is necessary to turn node into sleep state when no data exist. This paper addresses the energy consumption analysis of Direct-Sequence (DS) versus Time-Hopping (TH) multiple accesses and two kinds of sleeping protocols (slotted and unslotted) in PHY-MAC for Un networks. We introduce an analytical model for energy consumption or a node in both TH and DS multiple accesses and evaluate the energy consumption comparison between them and also the performance of the proposed sleeping protocols. Simulation results show that the energy consumption per packet of DS case is less than TH case and for slotted sleeping is less than that of unslotted one for bursty load case, but with respect to the load access delay unslotted one consumes less energy, that maximize node lifetime.

A Thoracic Model using Three-dimensional Finite Element Method (3차원 유한 요소법을 이용한 흉부 모델)

  • Deok-Won Kim
    • Journal of Biomedical Engineering Research
    • /
    • v.8 no.1
    • /
    • pp.57-62
    • /
    • 1987
  • A three-dimensional thoracic model was constructed using 8-node trilinear hexahedron elements. A three-dimensional steady-state finite element code was developed using FORTRAN. Its output consists of potential at each node. current In each element, and total current In each layer in the z-direction. The thoracic model was Implemented to calculate basal impedance(Zo) In Impedance CardiograPhy Generalized Laplace's equation was solved with Dirlchlet(constant potentials) and homogeneous Neumann(no flux) boundary conditions. It was found that the con structed thoracic model was reasonable since the calculated potential differences between the adjacent electrodes and basal impedance were about the same as the measured ones.

  • PDF

Biologically Inspired Node Scheduling Control for Wireless Sensor Networks

  • Byun, Heejung;Son, Sugook;Yang, Soomi
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.506-516
    • /
    • 2015
  • Wireless sensor networks (WSNs) are generally comprised of densely deployed sensor nodes, which results in highly redundant sensor data transmissions and energy waste. Since the sensor nodes depend on batteries for energy, previous studies have focused on designing energy-efficient medium access control (MAC) protocols to extend the network lifetime. However, the energy-efficient protocols induce an extra end-to-end delay, and therefore recent increase in focus on WSNs has led to timely and reliable communication protocols for mission-critical applications. In this paper, we propose an energy efficient and delay guaranteeing node scheduling scheme inspired by biological systems, which have gained considerable attention as a computing and problem solving technique.With the identification of analogies between cellular signaling systems and WSN systems, we formulate a new mathematical model that considers the networking challenges of WSNs. The proposed bio-inspired algorithm determines the state of the sensor node, as required by each application and as determined by the local environmental conditions and the states of the adjacent nodes. A control analysis shows that the proposed bio-inspired scheme guarantees the system stability by controlling the parameters of each node. Simulation results also indicate that the proposed scheme provides significant energy savings, as well as reliable delay guarantees by controlling the states of the sensor nodes.

The Diversity-Multiplexing Tradeoff for Multiple-Antenna Adaptive Decode and Forward Relay Protocols Exploiting Imperfect CSIT (불완전한 채널정보를 사용하는 다중안테나 적응형 복호 후 전송 중계 프로토콜의 Diversity-Multiplexing Tradeoff 분석)

  • Yoon, Han-Sang;Yoon, Eun-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9A
    • /
    • pp.776-783
    • /
    • 2011
  • In this paper, assuming that the transmitter can exploit imperfect channel state information (CSI), the diversity-multiplexing tradeoff (DMT) functions of three adaptive decode-and-forward (DF) relay protocols, each of which uses multiple-antennas at the destination node, at the relay node, or at the source node are derived. When the imperfect CSI qualities for the source-relay link, the relay-destination link, and the source-destination link are subject to asymptotic conditions, the additional diversity gains attainable by exploiting the imperfect CSI at the transmitter for those three adaptive DF relay protocols are investigated.

A Prediction Method using property information change in DTN (DTN에서 속성 정보 변화에 따른 노드의 이동 예측 기법)

  • Jeon, Il-Kyu;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.425-426
    • /
    • 2016
  • In this paper, we proposed an algorithm based on movement prediction using Markov chain in delay tolerant networks(DTNs). The existing prediction algorithms require additional information such as a node's schedule and connectivity between nodes. However, network reliability is lowered when additional information is unknown. To solve this problem, we proposed an algorithm for predicting a movement path of the node by using Markov chain. The proposed algorithm maps speed and direction for a node into state, and predict movement path of the node using transition probability matrix generated by Markov chain. As the result, proposed algorithm show that the proposed algorithms has competitive delivery ratio but with less average latency.

  • PDF

Implementation of a Top-down Clustering Protocol for Wireless Sensor Networks (무선 네트워크를 위한 하향식 클러스터링 프로토콜의 구현)

  • Yun, Phil-Jung;Kim, Sang-Kyung;Kim, Chang-Hwa
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.95-106
    • /
    • 2010
  • Many researches have been performed to increase energy-efficiency in wireless sensor networks. One of primary research topics is about clustering protocols, which are adopted to configure sensor networks in the form of hierarchical structures by grouping sensor nodes into a cluster. However, legacy clustering protocols do not propose detailed methods from the perspective of implementation to determine a cluster's boundary and configure a cluster, and to communicate among clusters. Moreover, many of them involve assumptions inappropriate to apply those to a sensor field. In this paper, we have designed and implemented a new T-Clustering (Top-down Clustering) protocol, which takes into considerations a node's density, a distance between cluster heads, and remained energy of a node all together. Our proposal is a sink-node oriented top-down clustering protocol, and can form uniform clusters throughout the network. Further, it provides re-clustering functions according to the state of a network. In order to verify our protocol's feasibility, we have implemented and experimented T-Clustering protocol on Crossbow's MICAz nodes which are executed on TinyOS 2.0.2.

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

Control Design for Flexible Joint Manipulators with Mismatched Uncertainty : Adaptive Robust Scheme

  • Kim, Dong-Hwa
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.1 no.1
    • /
    • pp.32-43
    • /
    • 1999
  • Adaptive robust control scheme is introduced for flexible joint manipulator with nonlinearities and uncertainties. The system does not satisfy the matching condition due to insufficient actuators for each node. The control only relies on the assumption that the bound of uncertainty exists. Thus, the bounded value does not need to be known a prior. The control utilizes the update law by estimating the bound of the uncertainties. The control scheme uses the backstepping method and constructs a state transformation. Also, stability analysis is done for both transformed system and original system.

  • PDF